积极答复者
一天蓝屏重启五次,有人可以帮忙看一下原因吗?

问题
-
正常使用不会蓝屏待机蓝屏
这是错误文件
https://1drv.ms/u/s!Ak4_9s8KGBatqCNz7UHWkYRZl-f1?e=LtwWUX
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Users\92894\Desktop\041721-10046-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff804`2e600000 PsLoadedModuleList = 0xfffff804`2f22a3d0 Debug session time: Sat Apr 17 10:12:49.516 2021 (UTC + 8:00) System Uptime: 0 days 5:25:12.257 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ............................................ Loading User Symbols Loading unloaded module list ............ For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff804`2e9f5e40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb087`6518e340=000000000000001e 0: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* KMODE_EXCEPTION_NOT_HANDLED (1e) This is a very common bugcheck. Usually the exception address pinpoints the driver/function that caused the problem. Always note this address as well as the link date of the driver/image that contains this address. Arguments: Arg1: ffffffffc0000005, The exception code that was not handled Arg2: fffff8042e961472, The address that the exception occurred at Arg3: 0000000000000001, Parameter 0 of the exception Arg4: 0000000000000001, Parameter 1 of the exception Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 3640 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 83953 Key : Analysis.Init.CPU.mSec Value: 562 Key : Analysis.Init.Elapsed.mSec Value: 107762 Key : Analysis.Memory.CommitPeak.Mb Value: 78 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 1e BUGCHECK_P1: ffffffffc0000005 BUGCHECK_P2: fffff8042e961472 BUGCHECK_P3: 1 BUGCHECK_P4: 1 WRITE_ADDRESS: fffff8042f2fb390: Unable to get MiVisibleState Unable to get NonPagedPoolStart Unable to get NonPagedPoolEnd Unable to get PagedPoolStart Unable to get PagedPoolEnd unable to get nt!MmSpecialPagesInUse 0000000000000001 EXCEPTION_PARAMETER1: 0000000000000001 EXCEPTION_PARAMETER2: 0000000000000001 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: SearchProtocolHost.exe TRAP_FRAME: ffff800000000000 -- (.trap 0xffff800000000000) Unable to read trap frame at ffff8000`00000000 STACK_TEXT: ffffb087`6518e338 fffff804`2ea9177f : 00000000`0000001e ffffffff`c0000005 fffff804`2e961472 00000000`00000001 : nt!KeBugCheckEx ffffb087`6518e340 fffff804`2ea07eac : 00000000`00001000 ffffb087`6518ebe0 ffff8000`00000000 00000000`00000000 : nt!KiDispatchException+0x166d1f ffffb087`6518ea00 fffff804`2ea04043 : 00000001`444d1d00 ffffb087`6518edd0 00000000`00000000 ffffb087`6518edd4 : nt!KiExceptionDispatch+0x12c ffffb087`6518ebe0 fffff804`2e961472 : fffff804`2ec226d1 ffffc787`49f1adb0 ffff988e`a0891b10 00000000`00000000 : nt!KiPageFault+0x443 ffffb087`6518ed78 ffffc787`49f1ad01 : fffff804`00000075 00000000`00000000 ffffc787`5e08f01a 00020019`00000000 : nt!RtlpHpVaMgrRangeCreate+0x8a ffffb087`6518edb8 fffff804`00000075 : 00000000`00000000 ffffc787`5e08f01a 00020019`00000000 00000000`00000000 : 0xffffc787`49f1ad01 ffffb087`6518edc0 00000000`00000000 : ffffc787`5e08f01a 00020019`00000000 00000000`00000000 ffffc788`00000068 : 0xfffff804`00000075 SYMBOL_NAME: nt!RtlpHpVaMgrRangeCreate+8a MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.928 STACK_COMMAND: .thread ; .cxr ; kb BUCKET_ID_FUNC_OFFSET: 8a FAILURE_BUCKET_ID: 0x1E_c0000005_W_nt!RtlpHpVaMgrRangeCreate OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {d1601d81-c7ef-e127-203f-b02d7d74b78e} Followup: MachineOwner ---------
2021年4月17日 3:55
答案
-
你好,
是的,看您的系统版本,IMAGE_VERSION: 10.0.19041.928,应该是win10 2004的版本,似乎也安装了最新的安全更新。
根据栈的信息来看,360Hvm64+0x1b5b2,stornvme!ScsiToNVMe+0x1ff。
这是一个内核的错误,可能有关于360这个软件和stornvme.sys文件(这通常似乎是一个驱动程序NVME driver)。
1.建议您先完全卸载360软件。
2.到厂商的官网下载安装主板芯片组的驱动程序。
然后看是否正常。
如果回答是有帮助的, 请将其标记为答案, 可以帮助其他有相同问题的社区成员, 并快速找到有用的答复。
针对Windows 2008/2008R2的扩展支持将于2020年结束,之后微软将不再为其提供安全更新。点击此处或扫描二维码获取《在 Azure 上运行 Windows Server 的终极指南》,把握良机完成云迁移并实现业务现代化。
- 已标记为答案 xinyongyilan 2021年4月20日 1:47
2021年4月19日 2:59
全部回复
-
你好,
是的,看您的系统版本,IMAGE_VERSION: 10.0.19041.928,应该是win10 2004的版本,似乎也安装了最新的安全更新。
根据栈的信息来看,360Hvm64+0x1b5b2,stornvme!ScsiToNVMe+0x1ff。
这是一个内核的错误,可能有关于360这个软件和stornvme.sys文件(这通常似乎是一个驱动程序NVME driver)。
1.建议您先完全卸载360软件。
2.到厂商的官网下载安装主板芯片组的驱动程序。
然后看是否正常。
如果回答是有帮助的, 请将其标记为答案, 可以帮助其他有相同问题的社区成员, 并快速找到有用的答复。
针对Windows 2008/2008R2的扩展支持将于2020年结束,之后微软将不再为其提供安全更新。点击此处或扫描二维码获取《在 Azure 上运行 Windows Server 的终极指南》,把握良机完成云迁移并实现业务现代化。
- 已标记为答案 xinyongyilan 2021年4月20日 1:47
2021年4月19日 2:59 -
又蓝屏了QAQ
Microsoft (R) Windows Debugger Version 10.0.21306.1007 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. Loading Dump File [C:\Windows\Minidump\042121-8656-01.dmp] Mini Kernel Dump File: Only registers and stack trace are available ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: Windows 10 Kernel Version 19041 MP (8 procs) Free x64 Product: WinNt, suite: TerminalServer SingleUserTS Edition build lab: 19041.1.amd64fre.vb_release.191206-1406 Machine Name: Kernel base = 0xfffff803`42600000 PsLoadedModuleList = 0xfffff803`4322a3d0 Debug session time: Wed Apr 21 03:00:31.341 2021 (UTC + 8:00) System Uptime: 0 days 14:03:15.162 Loading Kernel Symbols ............................................................... ................................................................ ................................................................ ................................... Loading User Symbols Loading unloaded module list ............. For analysis of this file, run !analyze -v nt!KeBugCheckEx: fffff803`429f5e40 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffb581`b4f0e570=000000000000003b 3: kd> !analyze -v ******************************************************************************* * * * Bugcheck Analysis * * * ******************************************************************************* SYSTEM_SERVICE_EXCEPTION (3b) An exception happened while executing a system service routine. Arguments: Arg1: 00000000c0000005, Exception code that caused the bugcheck Arg2: fffff80342d0667e, Address of the instruction which caused the bugcheck Arg3: ffffb581b4f0ee70, Address of the context record for the exception that caused the bugcheck Arg4: 0000000000000000, zero. Debugging Details: ------------------ KEY_VALUES_STRING: 1 Key : Analysis.CPU.mSec Value: 2593 Key : Analysis.DebugAnalysisManager Value: Create Key : Analysis.Elapsed.mSec Value: 47425 Key : Analysis.Init.CPU.mSec Value: 280 Key : Analysis.Init.Elapsed.mSec Value: 3611 Key : Analysis.Memory.CommitPeak.Mb Value: 74 Key : WER.OS.Branch Value: vb_release Key : WER.OS.Timestamp Value: 2019-12-06T14:06:00Z Key : WER.OS.Version Value: 10.0.19041.1 BUGCHECK_CODE: 3b BUGCHECK_P1: c0000005 BUGCHECK_P2: fffff80342d0667e BUGCHECK_P3: ffffb581b4f0ee70 BUGCHECK_P4: 0 CONTEXT: ffffb581b4f0ee70 -- (.cxr 0xffffb581b4f0ee70) rax=fffffffffffffffd rbx=ffff9501ba5e7778 rcx=fffffffffffffffd rdx=0000000000000000 rsi=0000000000000000 rdi=ffff9501ba8ed040 rip=fffff80342d0667e rsp=ffffb581b4f0f870 rbp=0000000000000001 r8=00000000ffffffff r9=7fff9501ba5e7778 r10=7ffffffffffffffc r11=0000000000000000 r12=0000000000000000 r13=0000000000000000 r14=ffff9501ba5e7340 r15=0000000000000001 iopl=0 nv up ei pl zr na po nc cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00050246 nt!PspExitThread+0x1de: fffff803`42d0667e 0f8551321400 jne nt!PspExitThread+0x143435 (fffff803`42e498d5) [br=0] Resetting default scope BLACKBOXBSD: 1 (!blackboxbsd) BLACKBOXNTFS: 1 (!blackboxntfs) BLACKBOXPNP: 1 (!blackboxpnp) BLACKBOXWINLOGON: 1 CUSTOMER_CRASH_COUNT: 1 PROCESS_NAME: smartscreen.exe STACK_TEXT: ffffb581`b4f0f870 fffff803`42d098e3 : 00000000`00000000 ffff9501`c5fd0d00 00000000`00000000 00000000`00000000 : nt!PspExitThread+0x1de ffffb581`b4f0f970 fffff803`42d0986a : 00000000`00000000 00000000`00000000 ffff9501`ba8ed040 ffff9501`c5fd0d60 : nt!PspTerminateThreadByPointer+0x53 ffffb581`b4f0f9b0 fffff803`42a077b5 : 00000000`00000000 ffff9501`ba8ed040 ffffb581`b4f0fa80 ffff9501`00000000 : nt!NtTerminateThread+0x4a ffffb581`b4f0fa00 00007ff9`fd24d784 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : nt!KiSystemServiceCopyEnd+0x25 0000009a`2127f938 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : 0x00007ff9`fd24d784 SYMBOL_NAME: nt!PspExitThread+1de MODULE_NAME: nt IMAGE_NAME: ntkrnlmp.exe IMAGE_VERSION: 10.0.19041.928 STACK_COMMAND: .cxr 0xffffb581b4f0ee70 ; kb BUCKET_ID_FUNC_OFFSET: 1de FAILURE_BUCKET_ID: 0x3B_c0000005_nt!PspExitThread OS_VERSION: 10.0.19041.1 BUILDLAB_STR: vb_release OSPLATFORM_TYPE: x64 OSNAME: Windows 10 FAILURE_ID_HASH: {fc141b8c-59ff-5af7-581c-6f8cabfdb0e1} Followup: MachineOwner ---------
2021年4月21日 4:29